Metasploit for Pentesters

Price

Application Deadline

11/14/2014

Schedule

24 hours Saturday & Sunday, starting 17:00 – 20:00 November 15 – December 7
Description

“If I had eight hours to chop down a tree, I’d spend the first six of them sharpening my axe.”

 

This course is ideal for penetration testers, security enthusiasts and network administrators. The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.

 

Its best-known sub-project is the open source Metasploit Framework, a tool for developing and executing exploit code against a remote target machine. Other important sub-projects include the Opcode Database, shellcode archive and related research.

 

The Metasploit Project is well known for its anti-forensic and evasion tools, some of which are built into the Metasploit Framework.

 

This training course is part of six-month program:

 

A non-exhaustive list of topics to be taught includes:

Choosing and configuring an exploit (code that enters a target system by taking advantage of one of its bugs; about 900 different exploits for Windows, Unix/Linux and Mac OS X systems are included);

Optionally checking whether the intended target system is susceptible to the chosen exploit;

Choosing and configuring a payload (code that will be executed on the target system upon successful entry; for instance, a remote shell or a VNC server);

Choosing the encoding technique so that the intrusion-prevention system (IPS) ignores the encoded payload;

Executing the exploit

This modular approach – allowing the combination of any exploit with any payload – is the major advantage of the Framework. It facilitates the tasks of attackers, exploit writers and payload writers.

 

Metasploit runs on Unix (including Linux and Mac OS X) and on Windows. The Metasploit Framework can be extended to use add-ons in multiple languages.

 

To choose an exploit and payload, some information about the target system is needed, such as operating system version and installed network services. This information can be gleaned with port scanning and OS fingerprinting tools such as Nmap. Vulnerability scanners such as Nexpose or Nessus can detect target system vulnerabilities. Metasploit can import vulnerability scan data and compare the identified vulnerabilities to existing exploit modules for accurate exploitation.

 

Prerequisites

Knowledge in Linux Systems (LINUX 101), Network Architecture  ,Basics of Programming. and daily computer skills .

Week 1:

Exploitation Basics

 

Why Metasploit

 

Meterpreter Basics

 

Framework Organization

 

Post Exploitation Kung-Fu

 

Post Exploitation Privilege Escalation

 

Killing AV and Disabling Firewall

 

Stdapi and Priv Extensions

Week 2:

Token Stealing and Incognito

 

Espia and Sniffer Extensions

 

Post Exploitation Backdoors

 

Pivoting after Post Exploitation

 

Port Forwarding as part of Post Exploitation

 

Client Side Exploits

 

Backdoors and Rootkits in Post Exploitation

 

Exploit Research with MetasploitWeek 2

Week 3:

Railgun Basics

 

Railgun Adding Functions

 

Railgun Adding New DLLs

 

Resource Scripts

 

Database Support

Week 4:

Using Plugins

 

Meterpreter API Basics

 

Meterpreter Scripting - Migrate Clone

 

Meterpreter Scripting - Process Name Search

 

Social Engineering Toolkit Java Applet

Instructor Profile

Drinor Selmanaj has experience in cyber security. He has been working with FLOSSK for 2 years now he is one of many contributors in Kosovo in many open source projects, he has been doing workshops around Kosovo in data security, also being a FLOSSKie he has been maintaining the network of the SFK (Software Freedom Kosova) the annual conference about open source in Kosovo. His expertise are networks and computer security. While on workdays he is the CEO of HelloWorld, a company which is focused on application development. His passion about computer security and networks never stops. He will be showing some awesome stuff at advanced cyber security training.

Instructor
Drinor Selmanaj | Instructor

Drinor Selmanaj has experience in cyber security. He has been working with FLOSSK for 2 years now he is one of many contributors in Kosovo in many open source projects, he has been doing workshops around Kosovo in data security, also being a FLOSSKie he has been maintaining the network of the SFK (Software Freedom Kosova) the annual conference about open source in Kosovo. His expertise are networks and computer security. While on workdays he is the CEO of HelloWorld, a company which is focused on application development. His passion about computer security and networks never stops. He will be showing some awesome stuff at advanced cyber security training.

Facebook
Twitter
LinkedIn